Vulnerability Detection System (Xposed)
As the world becomes increasingly digitized, software systems have become a primary target for cyber attackers. With the proliferation of new technologies and the growing complexity of software systems, the number of vulnerabilities present in these systems has also grown. These vulnerabilities can...
| Main Author: | Nurin Azyyati, Kamilizahri |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2023
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/40876/ http://umpir.ump.edu.my/id/eprint/40876/1/CB20155.pdf |
Similar Items
Biologically Inspired Execution Framework for
Vulnerable Workflow Systems
by: Safdar, S., et al.
Published: (2009)
by: Safdar, S., et al.
Published: (2009)
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches
by: Hazim, Hanif, et al.
Published: (2021)
by: Hazim, Hanif, et al.
Published: (2021)
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
Special Needs Children Onboarding Management System
by: Nurin Iman, Mohammad Azmi
Published: (2023)
by: Nurin Iman, Mohammad Azmi
Published: (2023)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
A Framework of universities' smart campus to detect and mitigate vulnerabilities for IoT devices
by: Mazlina, Abdul Majid, et al.
Published: (2023)
by: Mazlina, Abdul Majid, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Real Time Water Level Detection Systems for Water Treatment Plant
by: Mohd Burhanuddin, Hamzah, et al.
Published: (2016)
by: Mohd Burhanuddin, Hamzah, et al.
Published: (2016)
PMDA: A malicious peer detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2011)
by: Wei, Xianglin, et al.
Published: (2011)
Vehicle detection and tracking method
by: Suzana, Mohamed Salleh
Published: (2019)
by: Suzana, Mohamed Salleh
Published: (2019)
An Analysis on Vulnerabilities of Password Retrying
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
Driver Drowsiness Detection System
by: Ranjitha, M.M., et al.
Published: (2024)
by: Ranjitha, M.M., et al.
Published: (2024)
Malware detection through machine learning techniques
by: Amer, Ahmed, et al.
Published: (2019)
by: Amer, Ahmed, et al.
Published: (2019)
Face Detection System / Chan Beh Teng
by: Chan, Beh Teng
Published: (2004)
by: Chan, Beh Teng
Published: (2004)
Construction Site Safety Helmet Detection In Mobile Application
by: Ang, Suzanne
Published: (2023)
by: Ang, Suzanne
Published: (2023)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
Balanced hierarchical method of collision detection in
virtual environment
by: Sulaiman, Hamzah Asyrani, et al.
Published: (2011)
by: Sulaiman, Hamzah Asyrani, et al.
Published: (2011)
Fingertip detection using histogram of gradients and support vector machine
by: Sophian, Ali, et al.
Published: (2017)
by: Sophian, Ali, et al.
Published: (2017)
Investigating the effectiveness of point features matching for detecting gun items
by: Nur Najwa, Ibrahim
Published: (2018)
by: Nur Najwa, Ibrahim
Published: (2018)
Coronary artery stenosis detection and visualization / Tang Sze Ling
by: Tang, Sze Ling
Published: (2015)
by: Tang, Sze Ling
Published: (2015)
Application development for plastic bottle detection using deep learning
by: Fong, Yun Xin
Published: (2024)
by: Fong, Yun Xin
Published: (2024)
Change vulnerability forecasting using deep learning algorithm for Southeast Asia
by: Amelia Ritahani, Ismail, et al.
Published: (2018)
by: Amelia Ritahani, Ismail, et al.
Published: (2018)
An efficient DDoS attack detection framework for vehicular communication / Raenu Kolandaisamy
by: Raenu , Kolandaisamy
Published: (2020)
by: Raenu , Kolandaisamy
Published: (2020)
Automated intruder detection from image sequences using minimum volume sets
by: Ahmed, Tarem, et al.
Published: (2012)
by: Ahmed, Tarem, et al.
Published: (2012)
Alzheimer's diseases detection by using deep learning algorithms: a mini-review
by: Al-Shoukry, Suhad, et al.
Published: (2020)
by: Al-Shoukry, Suhad, et al.
Published: (2020)
Intelligent image search engine with AI-Based similarity detection for web application
by: Chong, Wai Soon
Published: (2024)
by: Chong, Wai Soon
Published: (2024)
Internet information server scanner : scanning on URL vulnerabilities / Tan Yu Jin.
by: Tan, Yu Jin
Published: (2002)
by: Tan, Yu Jin
Published: (2002)
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
by: Diaa , Mohammed Hassan Uliyan
Published: (2016)
by: Diaa , Mohammed Hassan Uliyan
Published: (2016)
A Review on Detection of COVID-19 Cases from Medical Images Using Machine Learning-Based Approach
by: Noor, Al-dieef, et al.
Published: (2021)
by: Noor, Al-dieef, et al.
Published: (2021)
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
by: Bilal , Ishfaq
Published: (2016)
by: Bilal , Ishfaq
Published: (2016)
Smart information system personal expenses advisory system
by: Lew, Wen Xiong
Published: (2018)
by: Lew, Wen Xiong
Published: (2018)
On-gift system
by: Nur Syazwani, Zaifulbahari
Published: (2018)
by: Nur Syazwani, Zaifulbahari
Published: (2018)
Evaluating Machine Learning Algorithms for Fake Currency Detection
by: Keerthana, S.N, et al.
Published: (2024)
by: Keerthana, S.N, et al.
Published: (2024)
Android mobile malware detection using Fuzzy AHP
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
A Convolutional Neural Network (CNN) Classification Model for Web Page: A Tool for Improving Web Page Category Detection Accuracy
by: Siti Hawa, Apandi, et al.
Published: (2023)
by: Siti Hawa, Apandi, et al.
Published: (2023)
Contractor And Visitor Management System Using Biometric Recognition (Vizika System)
by: Nur Alia Hidayah, Rohaya Udin
Published: (2023)
by: Nur Alia Hidayah, Rohaya Udin
Published: (2023)
Online chatting system for online community system / Lim Boon Hong
by: Lim, Boon Hong
Published: (2002)
by: Lim, Boon Hong
Published: (2002)
IBIS Management System
by: Nurain Aleeya, Che Zaharudin
Published: (2023)
by: Nurain Aleeya, Che Zaharudin
Published: (2023)
Mobile receipt system
by: Zulhaimi, Zulkefli
Published: (2019)
by: Zulhaimi, Zulkefli
Published: (2019)
Medcare reminder system
by: Mira Azrina, Shukor@Abdul Shukor
Published: (2016)
by: Mira Azrina, Shukor@Abdul Shukor
Published: (2016)
Similar Items
-
Biologically Inspired Execution Framework for
Vulnerable Workflow Systems
by: Safdar, S., et al.
Published: (2009) -
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches
by: Hazim, Hanif, et al.
Published: (2021) -
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011) -
Special Needs Children Onboarding Management System
by: Nurin Iman, Mohammad Azmi
Published: (2023) -
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)